Cyber-Threats News, Articles and Updates

Common network security misconceptions that increase expenditure

Subhalakshmi discusses the most common misconceptions about network security, that often cloud an organisation's judgment when it comes to protecting their IT assets.

How to respond to cyber-threats if you use managed IT service providers

Julia Bishop discusses a recent report on the risk posed by APT10 and actions companies should take to respond to such threats if they use managed IT service providers.

UK leaders more concerned with cyber-threats than their global peers

New Government statistics have revealed that in the last 12 months, half of UK businesses have suffered a cyber-security breach.

Low risk, high reward: Threat actors leave sophisticated attacks behind

According to new research by eSentire, cyber-criminals are moving away from sophisticated attacks in favour of inexpensive and automated methods of intrusions.

McAfee Labs highlights critical challenges to threat intel sharing

McAfee catalogues 176 new cyber-threats every minute, almost three every second; ransomware up 88 percent, mobile malware up 99 percent in 2016.

Nearly two-thirds of polled global organisations hit by ransomware

Sixty-one percent of organisations polled in a survey from CyberEdge Group responded that they'd been hit by a ransomware demand, a third of those paid the ransom demand.

Version of Facebook Lite app weighed down by Spy FakePlay mobile malware

A version of the social media mobile app Facebook Lite, most likely available via third-party sites in China, was found infected with malware that can steal personal information, Malwarebytes reported on Monday.

Buzz off, hackers! Fruitfly spyware infests Mac-based biomedical facilities

A newly discovered Mac malware with some very old coding has likely been targeting biomedical research facilities for at least two years without detection.

'Switch' leads to glitch: Android malware hijacks routers' DNS settings

A newly discovered Android trojan can sabotage entire Wi-Fi networks and the users who connect to them by accessing the router that an infected device is communicating with and executing a Domain Name System hijack attack.

The threat of privileged user access - monitoring and controlling privilege users

Marcell Gogan discusses the threat of privileged user access and how it often goes largely ignored

WAITING ON AMENDED COPY How to protect your business from cyber-threats

Annette Murphy explores how security professionals can prepare and protect their assets from Distributed Denial of Service (DDoS) attacks

Half of UK orgs feel they lack skills to mitigate cyber-threats

Nearly half of UK organisations (47 percent) feel they have insufficient skills in-house to deal with the current cyber-threat landscape.

Linux-run IoT devices under attack by NyaDrop

Internet of Things (IoT) devices running on the open-source Linux OS are under attack from NyaDrop.

Brazil hotbed of financial fraud, report

Brazil has emerged as a primary centre of financially motivated e-crime threat activity.

IP Expo: Is the software supply chain putting us at risk?

Josh Corman, founder of I Am the Cavalry, spoke at IP EXPO Europe 2016 and pointed the finger at the software supply chain to tackle cyber-threats, arguing that we need fewer and better suppliers.

Getting smart - a joined up approach to beating the hackers

As data breaches become commonplace and organisations struggle to keep pace, Treavor Dearing explains why integration and collaboration among IT security vendors is emerging as the only viable solution to beat cyber-criminals once and for all.

Cross border computer probes gets nod in Switzerland

The Swiss intelligence service received permission to begin tapping phones and monitoring emails following a vote in the nation's parliament and approval by a public referendum.

89% of mobile users wouldn't know if their device was cyber-attacked

A majority of mobile users (89 percent) wouldn't know if their device has been infected through a cyber-attack, revealing a massive lack of awareness of cyber-threats.

Guccifer 2.0 again denies Russian connection, mocks reports linking hacker to APT groups

An individual who self-identified as Guccifer 2.0 continues to deny reports by security firms that link the purported hacker or hacking group to Russian advanced persistent threat (APT) groups.

WordPress update fixes XSS issues

Bloggers using the WordPress platform are "strongly encouraged" to update their sites immediately to address persistent XSS issues.

IoT home routers used to launch application-level DDoS attack

Eight brands of IoT home routers were compromised and used to create botnets that launched an application-level DDoS attack against a website's multiple servers.

Attacks increase as a result of DDoS-for-hire services

DDoS attacks have increased in frequency, scale and complexity over the past year, driven by DDoS-for-hire services.

Senators push for Oversight hearing into Trump's Russia comments

US Senators asked Ted Cruz (R-TX) to hold a hearing that examines Donald Trump's Russia comments entreating Russia to "find the 30,000 emails that are missing."

Russian web hub Deer.io offering stolen goods and exploit services, report

A robust underground marketplace for the sale of stolen products from compromised accounts as well as shady online services has been detected in Russia.

How to protect against compromised credentials — without affecting employee productivity

François Amigorena explains why compromised credentials are a major cyber-threat to organisations and how cumbersome security wastes time, whereas contextual awareness allows greater security automatically.

Spike in cyber-attacks expected to exploit upcoming Olympics, report

An Israel-based security firm has issued a warning to fans of the upcoming Olympics to be wary of phony offers.

Phishing scam targets Brexit anxiety

A cyber-scam has been unfolding in the wake of the Brexit vote.

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.

Conficker tops ranking of most common malware family

Conficker maintains its rank as the most common malware family, according to Check Point's May 2016 Threat Index.

Sophisticated 'password attacks' continue, Citrix latest victim

Hackers used login information to launch a "sophisticated password attack" to login to Citrix's GoToMyPC user accounts, according to a company blog post.